Otkrivena su dva sigurnosna nedostatka vezana uz Cisco Secure Desktop koji se koristi kod VPN povezivanja tj. za zaštitu tijekom razdoblja razmjene podataka, stvaranjem sigurnog virtualnog korisničkog sučelja, i čišćenje osjetljivih podataka po završetku povezivanja. Oba su propusta vezana uz pogreške u radu "CSDWebInstallerCtrl" ActiveX kontrole (CSDWebInstaller.ocx). Napadaču omogućuju pokretanje proizvoljnog programskog koda, navođenjem korisnika na posjetu zlonamjerno oblikovane web stranice. Zasad nisu izdane odgovarajuće programske zakrpe, a o eventualnim promjenama korisnici će biti pravovremeno obaviješteni.
Cisco Secure Desktop CSDWebInstaller ActiveX Remote Code Execution
VUPEN ID VUPEN/ADV-2011-0513
CVE ID CVE-2011-0925 - CVE-2011-0926
CWE ID Available in VUPEN VNS Customer Area
CVSS V2 Available in VUPEN VNS Customer Area
Rated as Critical
Impact Available in VUPEN VNS Customer Area
Authentication Level Available in VUPEN VNS Customer Area
Access Vector Available in VUPEN VNS Customer Area
Release Date 2011-02-28
Share Twitter LinkedIn Facebook Delicious Digg Slashdot
Technical Description
Two vulnerabilities have been identified in Cisco Secure Desktop, which could be exploited by remote attackers to compromise a vulnerable system.
The first issue is caused by an error in the "CSDWebInstallerCtrl" ActiveX control (CSDWebInstaller.ocx) when handling a Cisco-signed executable file named "inst.exe", which could allow attackers to exploit certain vulnerabilities in signed executable files.
The second vulnerability is caused by an error in the "CSDWebInstallerCtrl" ActiveX control (CSDWebInstaller.ocx) that does not properly verify the digital signature of an executable file that is downloaded and executed, which could allow attackers to execute arbitrary code by tricking a user into visiting a malicious web page.
Affected Products
Cisco Secure Desktop versions 3.x
Solution
VUPEN Security is not aware of any vendor-supplied patch.
References
http://www.vupen.com/english/advisories/2011/0513
http://www.zerodayinitiative.com/advisories/ZDI-11-091/
http://www.zerodayinitiative.com/advisories/ZDI-11-092/
Credits
Vulnerabilities reported by TippingPoint ZDI.
Changelog
2011-02-28 : Initial release
Posljednje sigurnosne preporuke